Skip to Main Content
Let our cyber security experts become an extension of your in-house IT department. Find out more
Remote Working Policy Template Kit

Remote Working Policy Template Kit

SKU: 5706
Publishers: IT Governance Publishing
Format: Cloud Annual Subscription
ISBN13: 9781787783065
Published: 31 Mar 2020
Availability: Available now
  • Quickly create and implement your own secure remote working policies and procedures.
  • Contains a set of five templates – simply add your organisation details, customise and apply.
  • Establish a culture of secure home working among remote employees.
  • Developed by information security and data privacy experts.
  • Includes guidance to help you embed processes effectively.

Buy now, pay later! Enjoy the benefits of paying by purchase order with an IT Governance corporate account.  Apply online today or call our service centre team on +44 (0)333 800 7000.

Annual subscription year 1
Price: £50.00
ex. VAT
Annual subscription thereafter £1.00ex. VAT
 
Overview

Quickly establish a set of remote working policies and procedures using prepared templates

Are your employees working remotely? Remote access to your systems and staff using their own devices introduce additional security risks, but these can easily be mitigated with the right processes in place.

With our set of template policies and procedures, you can ensure your teams stay safe online when working from home.

The Remote Working Policy Template Kit contains the following essential documents:

  • BYOD (Bring Your Own Device) and remote working policy
  • BYOD (Bring Your Own Device) user agreement
  • Remote worker user agreement
  • Remote worker security procedure
  • BYOD (Bring Your Own Device) physical security policy
  • BYOD – Approved devices, operating systems, apps
  • BYOD – Rejected/unapproved devices, operating systems, apps
Benefits

Enforce secure remote working instantly

 Get to work right away

Quickly communicate and enforce company requirements for secure home working.

 Secure devices

Establish requirements for devices permitted to access company networks.

 Ensure strong cyber security measures

Implement security requirements around secure passwords, clear desk policies, the use of unauthorised software, data control, backups, device maintenance and insurance.

 Take precautionary measures

Ensure employees accept responsibility for information loss or corruption arising from any failure to follow corporate information security requirements.

 Guide your employees

Help employees understand and accept their access rights and the business reasons for those rights

Technical information

Technical information

  • All our documentation toolkits are electronically fulfilled and accessible via DocumentKits, our online platform.
  • Your subscription includes access for up to ten users.
  • The DocumentKits platform is compatible with all devices, operating systems and applications.
  • You will need to use the latest version of your chosen web browser (e.g. Chrome, Edge, Firefox or Internet Explorer).

End-User DocumentKits Agreement

If you are thinking about purchasing a toolkit, please click here to review the end-user licence agreement for DocumentKits.

For more information, visit our DocumentKits FAQ page.

Customer Reviews

(4.00)stars out of 5
Number of reviews: 1
1. on 26/11/2020, said:
4 stars out of 5
Very comprehensive. Templates for every situaton
Showing comments 1-1 of 1
This website uses cookies. View our cookie policy
WIN £100
Loading...